Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,224 Full-Text Articles 2,686 Authors 558,456 Downloads 120 Institutions

All Articles in Software Engineering

Faceted Search

2,224 full-text articles. Page 6 of 76.

Combined Classifier For Cross-Project Defect Prediction: An Extended Empirical Study, Yun ZHANG, David LO, Xin XIA, Jianling SUN 2018 Singapore Management University

Combined Classifier For Cross-Project Defect Prediction: An Extended Empirical Study, Yun Zhang, David Lo, Xin Xia, Jianling Sun

Research Collection School Of Information Systems

To facilitate developers in effective allocation of their testing and debugging efforts, many software defect prediction techniques have been proposed in the literature. These techniques can be used to predict classes that are more likely to be buggy based on the past history of classes, methods, or certain other code elements. These techniques are effective provided that a sufficient amount of data is available to train a prediction model. However, sufficient training data are rarely available for new software projects. To resolve this problem, cross-project defect prediction, which transfers a prediction model trained using data from one project to another ...


Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems 2018 Southern Methodist University

Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems

Computer Science and Engineering Theses and Dissertations

Mobile phones and other devices with embedded sensors are becoming increasingly ubiquitous. Audio and motion sensor data may be able to detect information that we did not think possible. Some researchers have created models that can predict computer keyboard typing from a nearby mobile device; however, certain limitations to their experiment setup and methods compelled us to be skeptical of the models’ realistic prediction capability. We investigate the possibility of understanding natural keyboard typing from mobile phones by performing a well-designed data collection experiment that encourages natural typing and interactions. This data collection helps capture realistic vulnerabilities of the security ...


Octopus: An Online Topic-Aware Influence Analysis System For Social Networks, Ju FAN, Jiarong QIU, Yuchen LI, Qingfei MENG, Dongxiang ZHANG, Guoliang LI, Kian-Lee TAN, Xiaoyong DU 2018 Singapore Management University

Octopus: An Online Topic-Aware Influence Analysis System For Social Networks, Ju Fan, Jiarong Qiu, Yuchen Li, Qingfei Meng, Dongxiang Zhang, Guoliang Li, Kian-Lee Tan, Xiaoyong Du

Research Collection School Of Information Systems

The wide adoption of social networks has broughta new demand on influence analysis. This paper presents OCTOPUSthat offers social network users and analysts valuableinsights through topic-aware social influence analysis services.OCTOPUS has the following novel features. First, OCTOPUSprovides a user-friendly interface that allows users to employsimple and easy-to-use keywords to perform influence analysis.Second, OCTOPUS provides three powerful keyword-basedtopic-aware influence analysis tools: keyword-based influentialuser discovery, personalized influential keywords suggestion,and interactive influential path exploration. These tools cannot only discover influential users, but also provide insights onhow the users influence the network. Third, OCTOPUS enablesonline influence analysis, which provides end-users with ...


Entagrec(++): An Enhanced Tag Recommendation System For Software Information Sites, Shaowei Wang, David LO, Bogdan VASILESCU, Alexander SEREBRENIK 2018 Singapore Management University

Entagrec(++): An Enhanced Tag Recommendation System For Software Information Sites, Shaowei Wang, David Lo, Bogdan Vasilescu, Alexander Serebrenik

Research Collection School Of Information Systems

Software engineers share experiences with modern technologies by means of software information sites, such as Stack Overflow. These sites allow developers to label posted content, referred to as software objects, with short descriptions, known as tags. However, tags assigned to objects tend to be noisy and some objects are not well tagged. To improve the quality of tags in software information sites, we propose EnTagRec, an automatic tag recommender based on historical tag assignments to software objects and we evaluate its performance on four software information sites, Stack Overflow, Ask Ubuntu, Ask Different, and Free code. We observe that that ...


Entagrec(++): An Enhanced Tag Recommendation System For Software Information Sites, Shawei WANG, David LO, Bogdan VASILESCU, Alexander SEREBRENIK 2018 Singapore Management University

Entagrec(++): An Enhanced Tag Recommendation System For Software Information Sites, Shawei Wang, David Lo, Bogdan Vasilescu, Alexander Serebrenik

Research Collection School Of Information Systems

Software engineers share experiences with modern technologies using software information sites, such as Stack Overflow. These sites allow developers to label posted content, referred to as software objects, with short descriptions, known as tags. Tags help to improve the organization of questions and simplify the browsing of questions for users. However, tags assigned to objects tend to be noisy and some objects are not well tagged. For instance, 14.7% of the questions that were posted in 2015 on Stack Overflow needed tag re-editing after the initial assignment. To improve the quality of tags in software information sites, we propose ...


Real World, Large Scale Iot Systems For Community Eldercare: Experiences And Lessons Learned, Alvin Cerdena VALERA, Wei Qi LEE, Hwee-Pink TAN, Hwee Xian TAN, Huiguang LIANG 2018 Singapore Management University

Real World, Large Scale Iot Systems For Community Eldercare: Experiences And Lessons Learned, Alvin Cerdena Valera, Wei Qi Lee, Hwee-Pink Tan, Hwee Xian Tan, Huiguang Liang

Research Collection School Of Information Systems

The paradigm of aging-in-place - where the elderly live and age in their own homes, independently and safely, with care provided by the community - is compelling, especially in societies that face both shortages in institutionalized eldercare resources, and rapidly-aging populations. When the number of elderly who live alone rises rapidly, support and care from their communities become increasingly critical. Internet-of-Things(IoT) technologies, particularly in-home monitoring solutions, are becoming mature. They can become the fundamental enabler for smart community eldercare. In this chapter, we share our real-world experiencesgleaned from an ongoing large-scale project on IoT-enabled community eldercare. We identify technology-centric challenges that ...


Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý 2018 Brno University of Technology, Brno, Czech Republic

Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated ...


Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed 2018 CUNY Graduate Center

Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

The Java 8 Stream API sets forth a promising new programming model that incorporates functional-like, MapReduce-style features into a mainstream programming language. However, using streams correctly and efficiently may involve subtle considerations. In this poster, we present our ongoing work and preliminary results to- wards an automated refactoring approach that assists developers in writing optimal stream code. The approach, based on ordering and typestate analysis, determines when it is safe and advantageous to convert streams to parallel and optimize a parallel streams.


Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey 2018 Air Force Institute of Technology

Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey

Theses and Dissertations

The inflexible nature of traditional computer networks has led to tightly-integrated systems that are inherently difficult to manage and secure. New designs move low-level network control into software creating software-defined networks (SDN). Augmenting an existing network with these enhancements can be expensive and complex. This research investigates solutions to these problems. It is hypothesized that an add-on device, or "shim" could be used to make a traditional switch behave as an OpenFlow SDN switch while maintaining reasonable performance. A design prototype is found to cause approximately 1.5% reduction in throughput for one ow and less than double increase in ...


An Analysis Of Multi-Domain Command And Control And The Development Of Software Solutions Through Devops Toolsets And Practices, Mason R. Bruza 2018 Air Force Institute of Technology

An Analysis Of Multi-Domain Command And Control And The Development Of Software Solutions Through Devops Toolsets And Practices, Mason R. Bruza

Theses and Dissertations

Multi-Domain Command and Control (MDC2) is the exercise of command and control over forces in multiple operational domains (namely air, land, sea, space, and cyberspace) in order to produce synergistic effects in the battlespace, and enhancing this capability has become a major focus area for the United States Air Force (USAF). In order to meet demands for MDC2 software, solutions need to be acquired and/or developed in a timely manner, information technology infrastructure needs to be adaptable to new software requirements, and user feedback needs to drive iterative updates to fielded software. In commercial organizations, agile software development methodologies ...


Quality Of Service Impacts Of A Moving Target Defense With Software-Defined Networking, Samuel A. Mayer 2018 Air Force Institute of Technology

Quality Of Service Impacts Of A Moving Target Defense With Software-Defined Networking, Samuel A. Mayer

Theses and Dissertations

An analysis of the impact a defensive network technique implemented with software-defined networking has upon quality of service experienced by legitimate users. The research validates previous work conducted at AFIT to verify claims of defensive efficacy and then tests network protocols in common use (FTP, HTTP, IMAP, POP, RTP, SMTP, and SSH) on a network that uses this technique. Metrics that indicate the performance of the protocols under test are reported with respect to data gathered in a control network. The conclusions of these experiments enable network engineers to determine if this defensive technique is appropriate for the quality of ...


Visualize To Realize: Improving Safety Of First Responders, Vikas Sahu 2018 Updated - AIS

Visualize To Realize: Improving Safety Of First Responders, Vikas Sahu

Student Research and Creative Activity Fair

The goal of this study is to improve the safety of first responders during an emergency hazardous material (hazmat) incident.

  • A first responder (FR) is an individual who arrives first during a hazmat incident and takes the initiative to act in order to minimize the risk to public health and property from such incidents. Often first responders are firefighters.
  • The reports of National Fire Protection Association recorded a national average of more than 30,000 firefighter injuries between 2010-16 (National Fire Protection Association, 2017).
  • According to the US Fire Administration, an average fatality of 120 firefighters were recorded between 2010-16 ...


Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole McElroy, Ryan Ernst 2018 University of Nebraska at Omaha

Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst

Student Research and Creative Activity Fair

Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers ...


Overfitting In Semantics-Based Automated Program Repair, Dinh Xuan Bach LE, Ferdian THUNG, David LO, Claire LE GOUES 2018 Singapore Management University

Overfitting In Semantics-Based Automated Program Repair, Dinh Xuan Bach Le, Ferdian Thung, David Lo, Claire Le Goues

Research Collection School Of Information Systems

The primary goal of Automated Program Repair (APR) is to automatically fix buggy software, to reduce the manual bug-fix burden that presently rests on human developers. Existing APR techniques can be generally divided into two families: semantics- vs. heuristics-based. Semantics-based APR uses symbolic execution and test suites to extract semantic constraints, and uses program synthesis to synthesize repairs that satisfy the extracted constraints. Heuristic-based APR generates large populations of repair candidates via source manipulation, and searches for the best among them. Both families largely rely on a primary assumption that a program is correctly patched if the generated patch leads ...


Engagemon: Multi-Modal Engagement Sensing For Mobile Games, Sinh HUYNH, Seungmin KIM, JeongGil KO, Rajesh Krishna BALAN, Youngki LEE 2018 Singapore Management University

Engagemon: Multi-Modal Engagement Sensing For Mobile Games, Sinh Huynh, Seungmin Kim, Jeonggil Ko, Rajesh Krishna Balan, Youngki Lee

Research Collection School Of Information Systems

Understanding the engagement levels players have with a game is a useful proxy for evaluating the game design and user experience. This is particularly important for mobile games as an alternative game is always just an easy download away. However, engagement is a subjective concept and usually requires fine-grained highly disruptive interviews or surveys to determine accurately. In this paper, we present EngageMon, a first-of-its-kind system that uses a combination of sensors from the smartphone (touch events), a wristband (photoplethysmography and electrodermal activity sensor readings), and an external depth camera (skeletal motion information) to accurately determine the engagement level of ...


An Empirical Study Of Css Code Smells In Web Frameworks, Tobias Paul Bleisch 2018 California Polytechnic State University, San Luis Obispo

An Empirical Study Of Css Code Smells In Web Frameworks, Tobias Paul Bleisch

Master's Theses and Project Reports

Cascading Style Sheets (CSS) has become essential to front-end web development for the specification of style. But despite its simple syntax and the theoretical advantages attained through the separation of style from content and behavior, CSS authoring today is regarded as a complex task. As a result, developers are increasingly turning to CSS preprocessor languages and web frameworks to aid in development. However, previous studies show that even highly popular websites which are known to be developed with web frameworks contain CSS code smells such as duplicated rules and hard-coded values. Such code smells have the potential to cause adverse ...


Smartwatch-Based Early Gesture Detection & Trajectory Tracking For Interactive Gesture-Driven Applications, Tran Huy VU, Archan MISRA, Quentin ROY, Kenny Tsu Wei CHOO, Youngki LEE 2018 Singapore Management University

Smartwatch-Based Early Gesture Detection & Trajectory Tracking For Interactive Gesture-Driven Applications, Tran Huy Vu, Archan Misra, Quentin Roy, Kenny Tsu Wei Choo, Youngki Lee

Research Collection School Of Information Systems

The paper explores the possibility of using wrist-worn devices (specifically, a smartwatch) to accurately track the hand movement and gestures for a new class of immersive, interactive gesture-driven applications. These interactive applications need two special features: (a) the ability to identify gestures from a continuous stream of sensor data early–i.e., even before the gesture is complete, and (b) the ability to precisely track the hand’s trajectory, even though the underlying inertial sensor data is noisy. We develop a new approach that tackles these requirements by first building a HMM-based gesture recognition framework that does not need an ...


A Call To Promote Soft Skills In Software Engineering, Luiz Fernando Capretz, Fahem Ahmed 2018 University of Western Ontario

A Call To Promote Soft Skills In Software Engineering, Luiz Fernando Capretz, Fahem Ahmed

Electrical and Computer Engineering Publications

We have been thinking about other aspects of software engineering for many years; the missing link in engineering software is the soft skills set, essential in the software development process. Although soft skills are among the most important aspects in the creation of software, they are often overlooked by educators and practitioners. One of the main reasons for the oversight is that soft skills are usually related to social and personality factors, i.e., teamwork, motivation, commitment, leadership, multi-culturalism, emotions, interpersonal skills, etc. This editorial is a manifesto declaring the importance of soft skills in software engineering with the intention ...


Rule-Based Specification Mining Leveraging Learning To Rank, Zherui CAO, Yuan TIAN, Bui Tien Duy LE, David LO 2018 Singapore Management University

Rule-Based Specification Mining Leveraging Learning To Rank, Zherui Cao, Yuan Tian, Bui Tien Duy Le, David Lo

Research Collection School Of Information Systems

Software systems are often released without formal specifications. To deal with the problem of lack of and outdated specifications, rule-based specification mining approaches have been proposed. These approaches analyze execution traces of a system to infer the rules that characterize the protocols, typically of a library, that its clients must obey. Rule-based specification mining approaches work by exploring the search space of all possible rules and use interestingness measures to differentiate specifications from false positives. Previous rule-based specification mining approaches often rely on one or two interestingness measures, while the potential benefit of combining multiple available interestingness measures is not ...


Identifying Self-Admitted Technical Debt In Open Source Projects Using Text Mining, Qiao HUANG, Emad SHIHAB, Xin XIA, David LO, Shanping LI 2018 Zhejiang University

Identifying Self-Admitted Technical Debt In Open Source Projects Using Text Mining, Qiao Huang, Emad Shihab, Xin Xia, David Lo, Shanping Li

Research Collection School Of Information Systems

Technical debt is a metaphor to describe the situation in which long-term code quality is traded for short-term goals in software projects. Recently, the concept of self-admitted technical debt (SATD) was proposed, which considers debt that is intentionally introduced, e.g., in the form of quick or temporary fixes. Prior work on SATD has shown that source code comments can be used to successfully detect SATD, however, most current state-of-the-art classification approaches of SATD rely on manual inspection of the source code comments. In this paper, we proposed an automated approach to detect SATD in source code comments using text ...


Digital Commons powered by bepress